Type
stringclasses
5 values
Text
stringlengths
1
77
Fixed Text
stringlengths
1
78
Score
float64
0.18
1
Original Sentence ID
int64
0
663
Original Sentence
stringlengths
823
2.47k
Decoded Sentence
stringlengths
813
2.19k
__index_level_0__
int64
0
16.6k
Malware
B
B-Hack
0.842463
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
0
Malware
Poison Ivy
Poison Ivy,
0.759196
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
2
Malware
B-Hack I-Hack I
B-Hack I-Hack I-Hack
0.677099
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
4
Malware
Hack
I-Hack
0.798637
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
6
Indicator
I
I-
0.65947
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
7
Malware
B-Hack I
B-Hack I-Hack
0.737819
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
11
Malware
LOWBALL
LOWBALL
0.980675
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
16
Indicator
upload.bat
upload.bat
0.674888
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
20
Malware
BUBBLEWRAP
BUBBLEWRAP
0.910917
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
23
Indicator
Backdoor.APT.FakeWinHTTPHelper
Backdoor.APT.FakeWinHTTPHelper)
0.796803
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
24
System
Dropbox
Dropbox
0.995472
0
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China . Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past . The B-Hack has targeted B- I- I- in the past . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television . In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer . We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command .
The B-Hack has largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. The B-Hack started targeting Hong Kong B- I-, probably in response to B- and B- challenges in Hong Kong and China. Multiple China-based B-Hack I-Hack I-Hack have targeted B- I- I- in the past. The B-Hack has targeted B- I- I- in the past. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack I-Hack sent spear phishing emails to a number of Hong Kong-based B- I-, including newspapers, radio, and television. In August 2015, the B-Hack sent spear phishing emails to a number of Hong Kong-based B- I-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. Once the LOWBALL malware calls back to the Dropbox account, the B-Hack will create a file called upload.bat which contains commands to be executed on the compromised computer. We observed the B-Hack upload a second stage malware, known as BUBBLEWRAP (also known as Backdoor.APT.FakeWinHTTPHelper) to their Dropbox account along with the following command.
25
Malware
BUBBLEWRAP
BUBBLEWRAP.
0.983197
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
28
Malware
LOWBALL
LOWBALL
0.992205
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
29
Malware
BUBBLEWRAP
BUBBLEWRAP
0.938959
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
30
Malware
Poison Ivy
Poison Ivy
0.882531
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
38
Malware
B
B-Hack
0.987141
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
41
Malware
B-Hack
B-Hack,
0.73144
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
44
Malware
B-Hack I-Hack
B-Hack I-Hack,
0.748079
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
45
Organization
FireEye
FireEye
0.981952
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
46
Malware
Poison Ivy RAT
Poison Ivy RAT
0.870152
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
48
System
Malaysia Airlines Flight MH370
Malaysia Airlines Flight MH370
0.807569
1
We have previously observed the B-Hack I-Hack use BUBBLEWRAP . The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets . The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy . The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I- . In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations . In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- .
We have previously observed the B-Hack I-Hack use BUBBLEWRAP. The LOWBALL first stage malware allows the B-Hack to collect information from victims and then deliver the BUBBLEWRAP second stage malware to their victims after verifying that they are indeed interesting targets. The B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. An B-Hack B-Hack linked to China and alleged to be responsible for B- I- against foreign B- and I-, has now pointed its focus inward at China autonomous territory Hong Kong. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack targeting Hong Kong B- outlets is called B-Hack and is known to researchers for using publicly available remote access Trojans such as Poison Ivy to attack B- and B- I- specializing in B- I- policy. The B-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. The B-Hack I-Hack, active since 2008, has been seen targeting organizations in the B- I-, B-, B-, and B- I-. In August 2013, FireEye reported that B-Hack had been using the Poison Ivy RAT in its operations. In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-.
50
System
Malaysia Airlines Flight MH370
Malaysia Airlines Flight MH370
0.925088
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
52
Indicator
- I
B- I-.
0.590108
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
53
Malware
LOWBALL
LOWBALL.
0.989813
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
58
Organization
FireEye
FireEye,
0.972959
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
59
System
Microsoft Office
Microsoft Office
0.625747
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
61
Vulnerability
vulnerabilities
vulnerabilities
0.895214
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
62
Malware
B
B-Hack's
0.735661
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
64
System
Dropbox
Dropbox
0.995977
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
66
Malware
BUBBLEWRAP
BUBBLEWRAP.
0.946254
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
67
Indicator
- I
B- I-,
0.637247
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
69
Malware
B-Hack
B-Hack
0.758959
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
76
Malware
MH370
MH370-themed
0.662341
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
77
Indicator
I
I-
0.542928
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
79
Malware
B-Hack I-Hack
B-Hack I-Hack
0.832244
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
80
Malware
Poison Ivy RAT
Poison Ivy RAT
0.936333
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
82
Malware
WinHTTPHelper
WinHTTPHelper
0.872568
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
88
Malware
B
B-
0.803492
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
89
Malware
I
I-.
0.468197
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
91
Organization
FireEye
FireEye
0.984038
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
92
Malware
B-Hack I-Hack
B-Hack I-Hack's
0.826789
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
93
Malware
Poison Ivy
Poison Ivy:
0.941438
2
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I- . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL . The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP . Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement . This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I- . FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper .
In March 2014, the B-Hack leveraged the disappearance of Malaysia Airlines Flight MH370 to target a B- in the Asia-Pacific region and a US-based B- I-. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. According to FireEye, the B-Hack sent out emails containing malicious documents designed to exploit Microsoft Office vulnerabilities in an effort to deliver a piece of malware dubbed LOWBALL. The B-Hack's Dropbox accounts have also been found to contain a different backdoor dubbed BUBBLEWRAP. Researchers have pointed out that it is not uncommon for China-based B-Hack I-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. Researchers have pointed out that it is not uncommon for B-Hack to target Hong Kong B- I-, particularly ones whose reporting focuses on the pro-democracy movement. This week the experts at FireEye discovered that a B-Hack of Chinese-based B-Hack called B-Hack had sent multiple MH370-themed spear phishing emails, the B-Hack targeted B- I- in Asia-Pacific, it is likely for B-Hack I-Hack purpose. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. The B-Hack used the popular Poison Ivy RAT and WinHTTPHelper malware to compromise the computers of B- I-. FireEye analysts documented the B-Hack I-Hack's B- in a previous paper titled Poison Ivy: Assessing Damage and Extracting Intelligence paper.
94
Malware
B
B-
0.891325
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
96
Malware
I
I-
0.722438
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
98
Malware
B-Hack I-Hack I-Hack
B-Hack I-Hack I-Hack.
0.897796
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
100
Organization
FireEye
FireEye
0.974321
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
101
Malware
B-Hack
B-Hack's
0.893538
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
102
Indicator
I
I-.
0.519386
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
104
Malware
BISCUIT
BISCUIT
0.862613
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
111
Malware
B-Hack
B-Hack
0.930773
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
112
Malware
Poison Ivy
Poison Ivy
0.982215
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
113
Malware
Gh0st RAT
Gh0st RAT.
0.857019
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
114
Malware
B-Hack I-Hack I-Hack
B-Hack I-Hack I-Hack,
0.940081
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
115
Malware
B-Hack I-Hack I-Hack
B-Hack I-Hack I-Hack
0.927681
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
116
Malware
B-Hack
B-Hack.
0.887859
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
117
Malware
B-Hack I-Hack
B-Hack I-Hack
0.837088
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
119
Malware
B-Hack I
B-Hack I-Hack,
0.820453
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
121
Malware
Hack
I-Hack,
0.809488
3
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March . Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack . FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I- . The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai . These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are . B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently . While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT . Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack . B-Hack were a highly prolific B-Hack I-Hack operating out of China . B-Hack is a China-based B-Hack I-Hack, active since mid-2006 .
The B- I- against Asian entities isn't isolated, the B-Hack also started another B- against the US-based B- I- on 14th March. Our analysis has led us to conclude that B-Hack is likely government-sponsored and one of the most persistent of China's B-Hack I-Hack I-Hack. FireEye said it has tracked B-Hack's B- since 2013 and the B-Hack has largely targeted organizations involved in B-, B-, and B- I-. The simplest conclusion based on these facts is that B-Hack is operating in China, and most likely in Shanghai. These data sets show that B-Hack is either operating in China during normal Chinese business hours or that B-Hack is intentionally going to painstaking lengths to look like they are. B-Hack has used and steadily modified BISCUIT since as early as 2007 and continues to use it presently. While B-Hack intruders occasionally use publicly available backdoors such as Poison Ivy and Gh0st RAT. Given the mission, resourcing, and location of B-Hack I-Hack I-Hack, we conclude that B-Hack I-Hack I-Hack is B-Hack. B-Hack were a highly prolific B-Hack I-Hack operating out of China. B-Hack is a China-based B-Hack I-Hack, active since mid-2006.
123
Malware
B-Hack
B-Hack's
0.699573
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
124
Organization
Arbor
Arbor
0.823305
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
125
Organization
FireEye
FireEye
0.984457
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
126
Malware
B-Hack
B-Hack
0.847108
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
127
Malware
HIGHTIDE
HIGHTIDE.
0.857273
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
128
Malware
B-Hack
B-Hack.
0.811271
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
131
Malware
RIPTIDE
RIPTIDE,
0.867159
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
134
Malware
B
B-
0.968426
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
135
System
Microsoft Word
Microsoft Word
0.97679
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
139
Indicator
.doc
(.doc)
0.655399
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
140
Vulnerability
CVE-2012
CVE-2012-0158.
0.714393
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
141
Malware
RIPTIDE
RIPTIDE
0.879229
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
145
Malware
HIGHTIDE
HIGHTIDE
0.87404
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
146
Indicator
- I
B- I-,
0.830147
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
152
Malware
Poison Ivy
Poison Ivy,
0.933017
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
153
Malware
B-Hack I-Hack I-Hack
B-Hack I-Hack I-Hack,
0.726628
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
154
Indicator
(
(I-Hack)
0.615539
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
157
Malware
Hack) I-Hack
(I-Hack) I-Hack
0.689164
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
160
Malware
B-Hack
B-Hack,
0.778244
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
161
Indicator
- I-
B- I-
0.790663
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
166
Indicator
- I- I- I-
B- I- I- I-
0.892679
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
168
Indicator
Backdoor.APT.Aumlib
Backdoor.APT.Aumlib
0.698781
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
170
Indicator
Backdoor.APT.Ixeshe
Backdoor.APT.Ixeshe
0.78944
4
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals . Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE . However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack . From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server . Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158 . FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset . They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors . A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B- . The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B- . About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families .
B-Hack's targets are consistent with larger People's Republic of China (PRC) goals. Since the release of the Arbor blog post, FireEye has observed B-Hack use a modified backdoor that we call HIGHTIDE. However, the malware shared several traits with the RIPTIDE and HIGHTIDE backdoor that we have attributed to B-Hack. From October 2012 to May 2014, FireEye observed B-Hack utilizing RIPTIDE, that communicates via HTTP to a hard-coded command and control (C2) server. Similar to B- I-, B-Hack infects target systems with HIGHTIDE using a Microsoft Word (.doc) document that exploits CVE-2012-0158. FireEye believes the change from RIPTIDE to HIGHTIDE represents a temporary tool shift to decrease malware detection while B-Hack developed a completely new malware toolset. They have largely targeted organizations involved in B-, B- and B- I-, typically using publicly available RATs such as Poison Ivy, as well some non-public backdoors. A China-based B-Hack I-Hack I-Hack, which FireEye tracks as an uncategorized advanced persistent B-Hack (I-Hack) I-Hack and other researchers refer to as B-Hack, may have conducted the B-. The B-Hack previous B- against B- and B- I- have largely focused on spear phishing emails written in English, destined for Western B-. About four months after B- I- I- I- publicized an B- on its network, the B-Hack behind the intrusion deployed updated versions of their Backdoor.APT.Aumlib and Backdoor.APT.Ixeshe malware families.
171
Malware
B-Hack I-Hack
B-Hack I-Hack
0.909625
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- . On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I-. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I-. On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack. B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I-. On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-
185
Malware
Hack
B-Hack,
0.744108
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- . On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I-. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I-. On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack. B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I-. On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-
188
Malware
Hack
I-Hack,
0.578931
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- . On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I-. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I-. On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack. B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I-. On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-
195
Malware
B-Hack
B-Hack
0.888018
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- . On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I-. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I-. On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack. B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I-. On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-
200
Indicator
- I- I
B- I- I-
0.811854
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- . On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I-. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I-. On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack. B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I-. On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-
204
Indicator
- I- I
B- I- I-.
0.839214
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- . On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I-. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I-. On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack. B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I-. On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-
206
Organization
ck
I-Hack
0.61167
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- . On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I-. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I-. On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack. B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I-. On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-
208
Indicator
B- I
B- I-,
0.791525
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- . On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I-. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I-. On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack. B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I-. On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-
210
Indicator
- and B- I
B- and B- I-.
0.821616
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- . On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I-. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I-. On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack. B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I-. On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-
214
Indicator
B- I-
B- I-
0.82218
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- . On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I-. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I-. On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack. B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I-. On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-
218
Malware
B-Hack
B-Hack.
0.749897
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- . On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I-. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I-. On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack. B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I-. On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-
220
Indicator
- I
B- I-.
0.789125
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- . On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I-. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I-. On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack. B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I-. On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-
222
Malware
B
B-
0.599037
5
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc . The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I- . Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I- . On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I- . While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack . B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I- . On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-Hack I-Hack also targeted a Taiwanese B- I-, sending a lure document that contained instructions for registration and subsequent listing of goods on a local Taiwanese auction website .
With this in mind, this week we are providing some indicators for a China based adversary who we crypt as " B-Hack I-Hack " B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. B-Hack I-Hack has a long list of high-profile victims and is known by a number of names including: B-Hack, B-Hack, B-Hack I-Hack, B-Hack, etc. The new B- mark the first significant stirrings from the B-Hack since it went silent in January in the wake of a detailed expose of the B-Hack and its exploits β€” and a retooling of what security researchers believe is a massive spying operation based in China. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack launched several B- I- I- targeting Japan and Taiwan in the B-, B- I-, B- and B- I- I-. Between November 26, 2015, and December 1, 2015, known and suspected China-based B-Hack I-Hack launched several B- I- I- targeting Japanese and Taiwanese organizations in the B-, B- I-, B- and B- I- I-. On November 26, 2015, a suspected China-based B-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. On November 26, 2015, a suspected China-based B-Hack I-Hack sent Japanese defense policy-themed spear phishing emails to multiple Japanese B- and B- I-. While attribution of the first two B- I- I- is still uncertain, we attribute the second December B- I- to the China-based B-Hack I-Hack that we refer to as B-Hack. B-Hack I-Hack sent spear phishing emails to two Taiwanese B- I-. On the same date that B-Hack targeted Taiwanese B-, suspected Chinese B-
224
Malware
B
B-
0.768215
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack . The suspected B-Hack targeting of the Taiwanese B- I- – in addition to the Taiwanese B- I- – further supports this possibility . B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " . B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. B- I-, the B- I-, B- I-, B- I- I-, B- I-, and B- I- . FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines . The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight . B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- . The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system .
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor. Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack. The suspected B-Hack targeting of the Taiwanese B- I- – in addition to the Taiwanese B- I- – further supports this possibility. B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver ". B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. B- I-, the B- I-, B- I-, B- I- I-, B- I-, and B- I-. FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines. The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight. B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I-. The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system.
229
Malware
ELMER
ELMER
0.974363
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack . The suspected B-Hack targeting of the Taiwanese B- I- – in addition to the Taiwanese B- I- – further supports this possibility . B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " . B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. B- I-, the B- I-, B- I-, B- I- I-, B- I-, and B- I- . FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines . The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight . B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- . The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system .
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor. Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack. The suspected B-Hack targeting of the Taiwanese B- I- – in addition to the Taiwanese B- I- – further supports this possibility. B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver ". B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. B- I-, the B- I-, B- I-, B- I- I-, B- I-, and B- I-. FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines. The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight. B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I-. The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system.
231
Indicator
I
I-
0.655015
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack . The suspected B-Hack targeting of the Taiwanese B- I- – in addition to the Taiwanese B- I- – further supports this possibility . B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " . B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. B- I-, the B- I-, B- I-, B- I- I-, B- I-, and B- I- . FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines . The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight . B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- . The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system .
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor. Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack. The suspected B-Hack targeting of the Taiwanese B- I- – in addition to the Taiwanese B- I- – further supports this possibility. B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver ". B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. B- I-, the B- I-, B- I-, B- I- I-, B- I-, and B- I-. FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines. The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight. B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I-. The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system.
233
Organization
ck
B-Hack.
0.842685
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack . The suspected B-Hack targeting of the Taiwanese B- I- – in addition to the Taiwanese B- I- – further supports this possibility . B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " . B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. B- I-, the B- I-, B- I-, B- I- I-, B- I-, and B- I- . FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines . The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight . B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- . The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system .
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor. Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack. The suspected B-Hack targeting of the Taiwanese B- I- – in addition to the Taiwanese B- I- – further supports this possibility. B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver ". B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. B- I-, the B- I-, B- I-, B- I- I-, B- I-, and B- I-. FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines. The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight. B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I-. The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system.
236
Indicator
- I
B- I-
0.824579
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack . The suspected B-Hack targeting of the Taiwanese B- I- – in addition to the Taiwanese B- I- – further supports this possibility . B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " . B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. B- I-, the B- I-, B- I-, B- I- I-, B- I-, and B- I- . FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines . The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight . B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- . The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system .
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor. Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack. The suspected B-Hack targeting of the Taiwanese B- I- – in addition to the Taiwanese B- I- – further supports this possibility. B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver ". B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. B- I-, the B- I-, B- I-, B- I- I-, B- I-, and B- I-. FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines. The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight. B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I-. The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system.
239
Organization
Microsoft
Microsoft
0.912773
6
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor . Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack . The suspected B-Hack targeting of the Taiwanese B- I- – in addition to the Taiwanese B- I- – further supports this possibility . B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver " . B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. B- I-, the B- I-, B- I-, B- I- I-, B- I-, and B- I- . FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines . The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight . B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I- . The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system .
It is possible, although not confirmed, that B-Hack was also responsible for targeting this B- I-, given both the timeframe and the use of the same n-day to eventually deploy the ELMER backdoor. Despite the differing sponsorship, penetration of Hong Kong and Taiwan-based B- I- continues to be a priority for China-based B-Hack. The suspected B-Hack targeting of the Taiwanese B- I- – in addition to the Taiwanese B- I- – further supports this possibility. B-Hack was embedding the encoded CnC IP address for the BLACKCOFFEE malware in legitimate Microsoft TechNet profiles pages and forum threads, a method some in the information security community call a " dead drop resolver ". B-Hack, also known as B-Hack, is a China-based B-Hack I-Hack that FireEye Intelligence has observed conducting network intrusions against U.S. B- I-, the B- I-, B- I-, B- I- I-, B- I-, and B- I-. FireEye has monitored B-Hack's use of BLACKCOFFEE variants since 2013 to masquerade malicious communication as normal web traffic by disguising the CnC communication as queries to web search engines. The use of BLACKCOFFEE demonstrates B-Hack's evolving use of public websites to hide in plain sight. B-Hack is a stealthy and extremely successful B-Hack I-Hack I-Hack (B-Hack) I-Hack known to target a broad range of verticals since at least 2009, including B-, B-, B-, B- I- I-, B-, B-, and B- I-. The B-Hack then installed the hcdLoader RAT, which installs as a Windows service and provides command line access to the compromised system.
245